diff options
Diffstat (limited to 'spec/models/protected_branch/push_access_level_spec.rb')
-rw-r--r-- | spec/models/protected_branch/push_access_level_spec.rb | 55 |
1 files changed, 55 insertions, 0 deletions
diff --git a/spec/models/protected_branch/push_access_level_spec.rb b/spec/models/protected_branch/push_access_level_spec.rb index 0aba51ea567..051cb78a6b6 100644 --- a/spec/models/protected_branch/push_access_level_spec.rb +++ b/spec/models/protected_branch/push_access_level_spec.rb @@ -34,4 +34,59 @@ RSpec.describe ProtectedBranch::PushAccessLevel do expect(level.errors.full_messages).to contain_exactly('Deploy key is not enabled for this project') end end + + describe '#check_access' do + let_it_be(:project) { create(:project) } + let_it_be(:protected_branch) { create(:protected_branch, :no_one_can_push, project: project) } + let_it_be(:user) { create(:user) } + let_it_be(:deploy_key) { create(:deploy_key, user: user) } + let!(:deploy_keys_project) { create(:deploy_keys_project, project: project, deploy_key: deploy_key, can_push: can_push) } + let(:can_push) { true } + + before_all do + project.add_guest(user) + end + + context 'when this push_access_level is tied to a deploy key' do + let(:push_access_level) { create(:protected_branch_push_access_level, protected_branch: protected_branch, deploy_key: deploy_key) } + + context 'when the deploy key is among the active keys for this project' do + specify do + expect(push_access_level.check_access(user)).to be_truthy + end + + context 'when the deploy_keys_on_protected_branches FF is false' do + before do + stub_feature_flags(deploy_keys_on_protected_branches: false) + end + + it 'is false' do + expect(push_access_level.check_access(user)).to be_falsey + end + end + end + + context 'when the deploy key is not among the active keys of this project' do + let(:can_push) { false } + + it 'is false' do + expect(push_access_level.check_access(user)).to be_falsey + end + end + end + end + + describe '#type' do + let(:push_level_access) { build(:protected_branch_push_access_level) } + + it 'returns :deploy_key when a deploy key is tied to the protected branch' do + push_level_access.deploy_key = create(:deploy_key) + + expect(push_level_access.type).to eq(:deploy_key) + end + + it 'returns :role by default' do + expect(push_level_access.type).to eq(:role) + end + end end |